At 11:21 PM 9/16/01 -0400, P.J. Ponder wrote:
Senator Hatch was interviewed by national media on Tuesday and stated that
the US government had voice intercepts of calls talking about success with
two targets. He was later criticized for talking about the intercepts.
Hm, criticized? Why not
--- begin forwarded text
Status: U
Date: Sun, 16 Sep 2001 20:36:04 -0400 (EDT)
From: Charles Platt [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: The Enduring Power of Stupidity
The Enduring Power of Stupidity
During the past five days I have read many essays. To me, all
of them have
A german TV news magazine (ZDF spezial) just mentioned that
the terrorists prepared and coordinated
also by using the internet, but no details were told.
[Moderator: I've listened to virtually all the news conferences made
so far. The FBI has yet to make any such statement.
The only
On Mon, Sep 17, 2001 at 09:10:48AM -0500, Matt Crawford wrote:
The only details I've heard are that the terrorists have elaborate
web sites to recruit and solicit donations. Far short of
operational use of the internet.
They had two websites in Germany, one for recruiting people
At 11:50 AM 9/17/01 +0200, Hadmut Danisch wrote:
Which politician would dare to ban hotels?
Which politician would fail to support mandatory registration of
motel occupants with local 'authorities'?
[Moderator's note: Everyone who's got a copy of Netscape or IE has
cryptographic software in
On Mon, 17 Sep 2001 11:50:13 Hadmut Danisch wrote:
Depends on which kind of logic you apply.
Technical logic: Yes, you're right.
Policital logic: No, you're wrong.
The reason is, that air planes, phones, hotels, cars, etc.
are used by common people - those who elect politicians -
and
On Sat, Sep 15, 2001 at 10:16:27AM -0700, Carl Ellison wrote:
I'm told that the LINUX 2.4 kernel comes with the RNG driver
built-in, but I haven't tried that.
It works almost out of box, kernel detects the chip and if you have the
necessary device file created (character 10,183 AFAIK) you can
Senator Hatch was interviewed by national media on Tuesday and stated that
the US government had voice intercepts of calls talking about success with
two targets. He was later criticized for talking about the intercepts.
Hm, criticized? Why not indicted?
(a) Whoever knowingly
At 01:25 PM 9/17/01 -0500, Matt Crawford wrote:
Somehow I doubt that it was not a speech or debate in the senate.
And what is the basis for this doubt?
All evidence, including that which I quoted in my original message,
indicates that he first said it in a media interview. Here is some more
At 02:14 PM 9/17/01 -0400, Jim Windle wrote:
Second, if we assume for a minute that the terrorist use public key
systems
Given their 1. quality opsec including 2. wise avoidance of wireless
phones, etc, and their
3. dependence on long-time personal contacts, isn't it more likely that
private
--- begin forwarded text
Status: U
Date: Mon, 17 Sep 2001 22:32:32 -0500
To: [EMAIL PROTECTED]
From: [EMAIL PROTECTED] (by way of [EMAIL PROTECTED])
Subject: ip: US cyberwarriors plan assault on Mideast states
Cc: [EMAIL PROTECTED]
11 matches
Mail list logo